CIE explore the various biometric methods available and how they are currently used in door entry or access control systems.
The access control and door entry market is constantly striving to develop and improve levels of security and more convenient identity authentication methods – and the growing trend for biometric validation ticks all the right boxes.
Using your own unique ‘biological identity’ as an authentication key and negating the need for any physical unlocking ‘device’ (ie. keys, fobs, ID cards, etc) can help to provide the most secure and effective solution for access control and door entry in a wide variety of residential and commercial property applications.
Biometrics is biological measurements or physical characteristics that are used to identify individuals.
There are three types of biometric security:
Biometric or physical characteristics are relatively unique. Each person’s biometric identity can be used as password systems for computers, phones and to restrict access to rooms and buildings. In simple terms biometric security means your body becomes the 'key' to unlock and gain access.
Once biometric data is scanned and mapped, it is then saved to be matched with future attempts at access. Most of the time, this data is encrypted and stored within the device or on a remote server.
|
|
|
|
|
|
|
|
|
Fingerprint Entry is a form of biometric access control; it uses a fingerprint reader to scan each individual registered user’s unique finger print for identity verification and matches it to pre-stored data.
Fingerprint entry systems work by reading a person’s fingerprint, which will then be compared with a pre-scanned dataset of your fingerprint. The system will then either identify a match or not. The response will send a signal to the door, which either allows the permitted individual access into a secure area, or remains closed.
Unlike traditional entry methods such as keys and pin codes which can be shared with others, fingerprint entry is nearly impossible to forge, misplace or fake as it is unique to the user. The information that is used to identify your fingerprint is also encrypted, which protects it from thievery or duplication.
Iris recognition or iris scanning involves the use of a specialised digital camera. The camera uses both visible and near-infrared light to take a clear, high contrast picture of a person’s iris and measures the unique patterns in people’s eyes.
Iris scanners work by illuminating the iris with infrared light to pick up unique patterns that are not visible to the naked eye. The scanners detect and exclude eyelashes, eyelids, and reflections that typically block parts of the iris. The results in a set of pixels containing only the iris. The pattern of the eye’s lines and colours are also analysed to extract a bit pattern which encodes the information in the iris. The bit pattern is then digitised and compared alongside the stored templates in a database for verification.
Iris scanning is an extremely secure option as your iris’ physical structure contains a pattern that is unique to each individual and is virtually impossible to replicate.
Facial recognition is a technology that matches human faces from a mapped identity stored against a database of different faces.
Facial recognition systems use algorithms which map hundreds of unique details of an individual’s face. Details used are things such as the distance between a person’s eyes; these details are then compared to the data stored in the facial recognition database.
Facial recognition in general is classed as being more secure than for example the ‘guessable’ pin code/password. This is mostly down to the fact that is it harder to hack. But like every security method nothing is ever 100% risk free. With facial recognition there is a potential that it can be spoofed, though developing technologies now feature vastly-improved anti-spoofing software and AI systems.
Voice control or voice recognition means you can control your device with spoken instructions, providing a frictionless (or ‘contactless’) system. In addition, voice recognition can be used for identity authentication in access control.
You can use voice control for things such as access control, unlocking/locking doors, answering texts/call people hands free, turn lights on, close curtains and turn heating on/off.
The average body temperature is 36.5 - 37.5 degrees centigrade however this varies from person to person. Anything over 38°C is classed as a fever and anything less than 35 degrees is classed as hypothermia.
Using body temperature detection for access control helps keep control of virus’s spreading by detecting high temperatures of people at entrances and restricting entry to anyone presenting above the 'safe' temperature range.
Main entrances and staff access points such as hospitals, factories and schools are increasingly using staff resource to manually test all people entering the building for fever-like symptoms using handheld infrared thermometers. The manual testing for body temperature, however, takes up valuable human resource and puts staff at risk of virus and disease transmission.
Whereas using an intercom device (such as the Akuvox R29C-B intercom) with built-in temperature detection provides a fully-automated first line of defence to highlight anyone entering the building that may be symptomatic of a virus. The system can be set up to highlight specific temperature ranges and, where required, deny access to anyone presenting above the 'safe' temperature range.
CIE is one of the UK's leading distributors of professional access control and door intercom products from leading brands 2N and Akuvox.
Our professional system design team provide a unique system architecture service for installers and integrators to help you deliver the best in door entry and access control technology.
If you would like to discuss your next access control system or would like more information on our full range of security products, please call our team today on T. 0115 9770075 or email us now.